{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:35:13Z","timestamp":1770816913783,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314418.1314425","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"37-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Breaking and fixing the inline approach"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Gajek","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"Lijun","family":"Liao","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"given":"J\u00f6rg","family":"Schwenk","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Security in a Web Services World: A Proposed Architecture and Roadmap April 7 2002. http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-secmap\/.  Security in a Web Services World: A Proposed Architecture and Roadmap April 7 2002. http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-secmap\/."},{"key":"e_1_3_2_1_2_1","unstructured":"A. Nadalin C. Kaler R. Monzillo and P. Hallam-Baker (Editor). Web services security: SOAP message security 1.1 Nov. 2006.  A. Nadalin C. Kaler R. Monzillo and P. Hallam-Baker (Editor). Web services security: SOAP message security 1.1 Nov. 2006."},{"key":"e_1_3_2_1_3_1","unstructured":"M. Bartel J. Boyer B. Fox B. LaMacchia and E. Simon. XML-signature syntax and processing Feb. 2002.  M. Bartel J. Boyer B. Fox B. LaMacchia and E. Simon. XML-signature syntax and processing Feb. 2002."},{"key":"e_1_3_2_1_4_1","unstructured":"Berglund S. Boag D. Chamberlin M. F. Fernandez M. Kay J. Robie and J. Simon. XML path language (XPath) version 2.0 Jan. 2007.  Berglund S. Boag D. Chamberlin M. F. Fernandez M. Kay J. Robie and J. Simon. XML path language (XPath) version 2.0 Jan. 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103024"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030120"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"J. Boyer. Canonical XML version 1.0 Mar. 2001.   J. Boyer. Canonical XML version 1.0 Mar. 2001.","DOI":"10.17487\/rfc3076"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"J. Boyer D. Eastlake and J. Reagle. Exclusive XML canonicalization version 1.0 July 2002.  J. Boyer D. Eastlake and J. Reagle. Exclusive XML canonicalization version 1.0 July 2002.","DOI":"10.17487\/rfc3076"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"J. Callas L. Donnerhacke H. Finney and R. Thayer. OpenPGP message format Nov. 1998.   J. Callas L. Donnerhacke H. Finney and R. Thayer. OpenPGP message format Nov. 1998.","DOI":"10.17487\/rfc2440"},{"key":"e_1_3_2_1_10_1","unstructured":"T. Imamura B. Dillaway and E. Simon. XML encryption syntax and processing Dec. 2002.  T. Imamura B. Dillaway and E. Simon. XML encryption syntax and processing Dec. 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"B. Kaliski. PKCS #7: Cryptographic message syntax standard version 1.5 Mar. 1998.   B. Kaliski. PKCS #7: Cryptographic message syntax standard version 1.5 Mar. 1998.","DOI":"10.17487\/rfc2315"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103026"},{"key":"e_1_3_2_1_13_1","volume-title":"IBM Research Devision","author":"McIntosh M.","year":"2005"},{"key":"e_1_3_2_1_14_1","volume-title":"OWASP AppSec Europe","author":"Rahaman M. A.","year":"2006"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180367.1180382"},{"key":"e_1_3_2_1_16_1","volume-title":"Bell Labs","author":"Wadler P.","year":"2000"},{"key":"e_1_3_2_1_17_1","volume-title":"Bell Labs","author":"Wadler P.","year":"2000"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Fairfax Virginia USA","acronym":"CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2007 ACM workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314418.1314425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314418.1314425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314418.1314425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":17,"alternative-id":["10.1145\/1314418.1314425","10.1145\/1314418"],"URL":"https:\/\/doi.org\/10.1145\/1314418.1314425","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}